A government client needs you to set up secure cryptographic key storage for some of their
extremely confidential data. You decide that the AWS CloudHSM is the best service for this.
However, there seem to be a few pre-requisites before this can happen, one of those being a
security group that has certain ports open. Which of the following is correct in regards to those
A security group that has no ports open to your network.
A security group that has only port 3389 (for RDP) open to your network.
A security group that has only port 22 (for SSH) open to your network.
A security group that has port 22 (for SSH) or port 3389 (for RDP) open to your network.
AWS CloudHSM provides secure cryptographic key storage to customers by making hardware
security modules (HSMs) available in the AWS cloud.
AWS CloudHSM requires the following environment before an HSM appliance can be
provisioned. A virtual private cloud (VPC) in the region where you want the AWS CloudHSM
service. One private subnet (a subnet with no Internet gateway) in the VPC. The HSM appliance
is provisioned into this subnet.
One public subnet (a subnet with an Internet gateway attached). The control instances are
attached to this subnet.
An AWS Identity and Access Management (IAM) role that delegates access to your AWS
resources to AWS CloudHSM.
An EC2 instance, in the same VPC as the HSM appliance, that has the SafeNet client software
installed. This instance is referred to as the control instance and is used to connect to and
manage the HSM appliance.
A security group that has port 22 (for SSH) or port 3389 (for RDP) open to your network. This
security group is attached to your control instances so you can access them remotely.